Files in this item: 1

Lately we have seen a growing interest from both public and private organisations to adopt Open
Source Software (OSS), not only for a few, specific applications but also on a more general level
throughout the organisation. As a consequence, the organisations’ decisions on adoption of OSS are
becoming increasingly more important and complex. We present three perspectives organisations can
employ in their decisions: seeing OSS acquisition as a business case, as COTS acquisition, and as architectural
change within a governance framework. We present case studies of decisions on OSS
adoption, and categorise the decision criteria we have found. Our results indicate that for large-scale
adoption of OSS, focus will be on architectural considerations: enterprise-wide architectures will at
first be a barrier, but in the long term OSS’s support of open standards can be a major enabler for
OSS adoption. In contrast, in smaller organisations and in small-scale adoption of OSS, the cheap
price of OSS is a major enabler, as it provides a good opportunity for experiments and short-term
economic benefits. For small organisations these experiments can lead to development of a common
IT-architecture, and in larger organisations OSS can be adopted in niche-areas, without significantly
violating an existing IT-architecture.
Keywords: open source, COTS, IT architecture, governance

Systems risk refers to the likelihood that an IS is inadequately guarded against certain types of damage or loss. While risks are posed by acts of God, hackers and viruses, consideration should also be given to the ‘insider’ threat of dishonest employees, intent on undertaking some form of computer abuse. Against this backdrop, a number of researchers have addressed the extent to which security managers are cognizant of the very nature of systems risk. In particular, they note how security practitioners’ knowledge of local threats, which form part of such risk, is often fragmented. This contributes to situations where risk reducing efforts are often less than effective. Security efforts are further complicated given that the task of managing systems risk requires input from a number of departments including, for example, HR, compliance, IS/IT and physical security. In a bid to complement existing research, but also offer a fresh perspective, this paper addresses systems risk from the offender’s perspective. If systems risk entails the likelihood that an IS is inadequately protected, this text considers those conditions, within the organisational context, which offer a criminal opportunity for the offender. To achieve this goal a model known as the ‘Crime Specific Opportunity Structure’ is advanced. Focussing on the opportunities for computer abuse, the model addresses the nature of such opportunities with regards to the organisational context and the threats posed by rogue employees. Drawing on a number of criminological theories, it is believed the model may help inform managers about local threats and, by so doing, enhance safeguard implementation.

Employee computer crime represents a substantial threat for organisations. Yet information security researchers and practitioners currently lack a clear understanding of how these crimes are perpetrated, which, as a consequence, hinders security efforts. We argue that recent developments in criminology can assist in addressing the insider threat. More specifically, we demonstrate how an approach, entitled Situational Crime Prevention, can not only enhance an understanding of employee computer crime, but also strengthen security practices which are designed to address this problem.

In this paper, we analyze the concept of human-computer interaction
in cultural and national contexts. Building and extending upon the framework
for understanding research in usability and culture by Honold [3], we give an
overview of publications in culture and HCI between 1998 and 2008, with a
narrow focus on high-level journal publications only. The purpose is to review
current practice in how cultural HCI issues are studied, and to analyse problems
with the measures and interpretation of this studies. We find that Hofstede’s
cultural dimensions has been the dominating model of culture, participants have
been picked because they could speak English, and most studies have been
large scale quantitative studies. In order to balance this situation, we
recommend that more researchers and practitioners do qualitative, empirical
work studies.

Files in this item: 1

Though this paper is in a very preliminary stage, I use the data gathered using the Delphi process to discuss some policy instruments that could be of use for emerging economies to create an environment of innovation. I acknowledge fiscal instruments to be an important driver but I choose not to focus on fiscal enablers of innovation rather focusing on how the lack of fiscal incentives can help create a sustainable environment for innovation. I use the early Indian experience and contrast it with later fiscal activism shown by the government to illustrate that perhaps the government need to focus on the supply side of knowledge and let the demand for knowledge and innovation be led by the firms at the local level. I argue this strategy to be the most sustainable in the long run.

The project on Personalisation of Self-service Solutions across On-line Platforms (POSS ON-LINE) focuses on users, clients, and self-service solutions. It is based on the understanding that clients and users are different and have different goals, and that self-service takes place in different contexts, on different platforms, and within different applications and this requires development of complementary approaches and solutions. Traditionally the tools used to predict user behaviour build on users leaving traces of their actions. However, new application and developments for existing applications do not gather traces, and new ways of profiling the user is needed. To digitalise e.g. public services such as TOLD & SKAT to meet citizen’s needs is a huge challenge because the user’s context has to be taken into account. As the tracking tools are not sufficiently refined (1,4,14) pushing of information to users with the aim of increasing sales, e.g. AMAZON, still leaves much to be wished for. Despite the fact that the user profile, which the system generates, is continuously updated through user’s interaction with the system (15), e.g. myyahoo.com. Personalised application may both service the client and the user. The system gathers data about the user, which enables the client to push information to the user. Personalisation enables graphic user interface design that is personalised and relevant to the individual user and invites the user to get access to information with less strain. Personalisation of self-service solutions is promising and IT companies are experiencing an increase in the clients’ demands. At the same time the development of solutions moves within a shorter and shorter time span. Hence the process of innovations is paced and there is an increasing need of new ways of looking at the process of development. However, we lack methods to predict user behaviour without having to deal with huge amounts of data and data from both quantitative data as well as life world observations are required.

Files in this item: 1

Copenhagen Business School is happy to host the 5th Danish Human Computer Interaction Research Symposium. The aim of the symposium is to stimulate interaction between researchers from academia and industry through oral presentations and a keynote presentation. We received 17 paper contributions for the symposium, of which 14 were presented orally in four panel sessions. Previously the symposium has been held at University of Aarhus 2001, University of Copenhagen 2002, Roskilde University Center 2003, Aalborg University 2004. Torkil Clemmensen & Lene Nielsen Copenhagen, November 2005
CONTENT
INTRODUCTION
DHRS 2005 – CONFERENCE PROGRAM
ABOUT THE KEYNOTE SPEAKER
EMOTION AS A CONSTRUCT IN HCI
Pradeep Yammiyavar
DESIGNING GAMES – BALANCING FUN AND SERIOUSNESS
Anne Marie Kanstrup & Ellen Christiansen
TRAPS & TRIGGERS -DESIGN FOR DISCUSSION
Rune Nielsen
EARLY EXPERIENCES FROM AN INSPIRATION CARD WORKSHOP
Kim Halskov Madsen & Peter Dalsgård
FASTTRACK SCROLLING: A FASTER AND MORE SATISFYING SCROLLING
INTERFACE FOR WEB BROWSERS
Søren Jakobsen
USING PERSONAS TO GUIDE ITERATIVE DEVELOPMENT
Anders Toxboe
"THEN THE PICTURE COMES IN YOUR MIND OF WHAT YOU HAVE SEEN ON TV" –
A STUDY OF PERSONAS DESCRIPTIONS AND USE
Lene Nielsen
DEALING WITH REALITY - IN THEORY
Gitte Skou Petersen
A NEW IFIP WORKING GROUP – HUMAN WORK INTERACTION DESIGN
Rikke Ørngreen, Torkil Clemmensen & Annelise Mark-Pejtersen
CLASSIFICATION OF DESCRIPTIONS USED IN SOFTWARE
AND INTERACTION DESIGN
Georg Strøm
OBSTACLES TO DESIGN IN VOLUNTEER BASED ORGANISATIONS
Olav W. Bertelsen & Pär-Ola Zander
PROCESS MANAGEMENT TOOLS IN HIGHER EDUCATION E-LEARNING – A NEW
RESEARCH AREA
Karin Tweddell Levinsen
FROM HANDICRAFT SCHOOL TO DESIGN UNIVERSITY
Eva Brandt
THE USE PROJECT: BRIDGING THE GAP BETWEEN USABILITY EVALUATION
AND SOFTWARE DEVELOPMENT
Als, B., Frøkjær, E., Hornbæk, K. , Høegh, R., Jensen, J., Nørgaard, M.,
Skov, M., Stage, J. & Uldall-Espersen, T.
BRIDGING BETWEEN IT AND THE ILLITERATE WORLD - RETHINKING HCI
Janni Nielsen

Files in this item: 1

In this chapter, I will review current approaches to online sociability and present and exemplify a psychological theory, the Social Reality theory, of online sociability. By analyzing sociability in a virtual world based university course, I will present and analyze examples on how to understand the students’ design of the conditions for sociability as communication about cultural symbols, such as avatars and virtual landscapes, and the social reality of perceived groups of people. The analysis results will be used to illustrate different kinds of online sociability: superficial, convivial, and negative sociability. The chapter suggests solutions and recommendations to designers and researchers with a focus on online communities and networked communication.

Files in this item: 1

In globalizing competitive markets knowledge exchange
between business organizations requires incentive
mechanisms to ensure tactical purposes while strategic
purposes are subject to joint organization and other
forms of contractual obligations. Where property of
knowledge (e.g. patents and copyrights) and contractbased
knowledge exchange do not obtain network
effectiveness because of prohibitive transaction costs in
reducing uncertainty, we suggest a robust model for peer
produced knowledge within a distributed setting. The
peer produced knowledge exchange model relies upon a
double loop knowledge conversion with symmetric
incentives in a network since the production of actor
specific knowledge makes any knowledge appropriation
by use of property rights by the actors irrelevant. Without
property rights in knowledge the actor network generates
opportunity for incentive symmetry over a period of time.
The model merges specific knowledge with knowledge
from other actors into a decision support system specific
for each actor in the network in recognition of actor role
differences. The article suggests a set of 9 static and 5
dynamic propositions for the model to maintain
symmetric incentives between different actor networks.
The model is proposed for business networks.

Information Systems scholars continuously debate about the nature of the IS discipline. Recently a series of articles have discussed whether the IS field has reached the status of a reference discipline. We address this issue by examining the application of the theory of sensemaking in IS research. Our findings show that the prospects for IS as a reference discipline are not promising. Based on these findings we suggest that IS scholars hallucinate when they a) assume that to become a 'real' academic discipline, IS has to become a reference discipline, and b) believe that IS will become a reference discipline in time. Hence, we describe the IS reference discipline discussion as a misconception, which should be abandoned in the pursuit of a stronger IS discipline. Academic legitimacy, information systems research, reference disciplines, theory application, theory of sensemaking

Files in this item: 1

Development and advancement of Information Society in on agenda of many nationstates today. As scholars, we can contribute to the effort by attempting to reconcile to the official rhetoric with the real life situations of "netizens". This paper is inspired by the publication of Leonard Jessup and Daniel Robey [2002], in wich the authors use anecdotes to demonstrate what advanced service possibilities are afforded by ubiquitous technology as contrasted to the residue of social behavior.This story illustrates that the succes of establishing Information Society should not be measured by the number of available services to citizens over the wireline and mobile Internet. The ultimate measure for success must be the extent to which poeple are aware about the availability of relevant content and are using the services [Daniel and Wilson, 2003, p.285].

Files in this item: 1

This paper presents a review of existing theoretical perspectives and empirical work on strategic
IT outsourcing. By presenting the main findings of various recent studies and elaborating on
current research gaps it conveys a picture of the past research, the present findings and the future
applications of IT outsourcing. Prior research has generated theoretical insights and largely qualitative
evidence on IT outsourcing. While quantitative studies remain sparse, limited to decisionmaking
and performance, there is a lack of quantitative empirical research examining outsourcing
processes more comprehensively. This paper outlines a simple, yet integrative process model and
develops propositions, which serve to integrate and compare theoretical strands, to evaluate existing
empirical research and to stimulate new avenues of empirical research.

IT-enabled innovations are of increasing importance for competitive success in a range
to develop associated competencies - in-house and/or through outsourcing - consequential for creating and sustaining competitive advantage. Against the backdrop of the importance of IT-enabled innovation, the key concern of this chapter is to address
the crucial question: How do capability development strategies differ between first-movers and late entrants in IT-enabled services. We develop theory based on three explorative case studies – FedEx, UPS and DHL. An analysis of the three companies reveals that
governance choices are influenced by a company’s attempts to create, imitate, and/or
leapfrog IT-enabled innovation in varying technological regimes.
of industries including express delivery services. How companies choose associated competences - in-house and/or through outsourcing - is conseqcreating and sustaining competitive advantage. Against the backdrop of the of IT-enabled innovation, the key concern of this chapter is to address